2006.08.24 Daily Security Reading
by Rodney Campbell on Aug.24, 2006, under Security
Email: Compliance and Information Management
Email is fundamental to internal and external communication for many organisations, with 87% of UK businesses highly dependent on electronic information. The nature and sheer volume of information that is shared and stored on email today makes email management critical to IT and corporate governance.
SSH Tunnels: Bypass (Almost) Any Firewall
The goal of this article is to present a few effective methods to revamp the way you work in a restricted corporation-like network. In order to achieve it we’re going to use SSH tunneling to bypass the firewall rules applied by your system administrator. We’ll start with breaking through simple restrictions and gradually pass to more and more elaborate firewalls while we move on.
MS06-042 Internet Explorer Crash is Exploitable
On August 8th Microsoft released MS06-042 which was a cumulative update for Internet Explorer. Over the course of a few days after the release of this patch various Internet Explorer users and businesses started to experience Internet Explorer crashing problems when viewing certain websites.
Sophos offers free rootkit detection and removal tool
Sophos has announced the availability of a new free-of-charge, standalone tool offering comprehensive rootkit detection and removal capabilities. Sophos Anti-Rootkit complements Sophos Anti-Virus 6.0 and other vendors' anti-virus solutions by providing an additional layer of protection for the Windows NT/2000/XP/2003 operating systems.
IBM to acquire Internet Security Systems
IBM announced on Wednesday that the technology giant has agreed to buy Internet Security Systems, an all-cash deal that the company valued at $1.3 billion, or about $28 a share.
Kevin Mitnick Web sites hacked
Instead of the usual description of Kevin Mitnick, his consulting services and books, the famed hacker's Web site on Sunday displayed a vulgar message.
For all of us here coding in PHP I put together a couple of configuration tips to provide an extra layer of security. Now while all of your own applications are of course bug free and will never get exploited, you just may have to use some third party code once in a while.